Examining the Empirical Relationship Between Quality of Service (QoS) and Trust Mechanisms of Cloud Services

Authors

  • Pooja Goyal Department of Computer Science and Application, MD University, Rohtak, Haryana, India
  • Sukhvinder Singh Deora Department of Computer Science and Application, MD University, Rohtak, Haryana, India

DOI:

https://doi.org/10.13052/jwe1540-9589.2372

Keywords:

Cloud broker, MCDM, trust estimation, QoS, risk assessment, multi-tenancy, SMI

Abstract

Service selection has emerged as a prominent challenge due to the flourishing demand for computing services and the dynamic nature of its resources. The increasing demand for cloud services makes it challenging to choose a provider offering equal services and facilities at costs that match those of competing providers. Apart from educating customers in the process of choosing cloud services, trust mechanisms include user reviews, reputation systems, and certifications assist to boost consumers’ confidence in cloud services. The service measurement index (SMI) offers a disciplined framework combining both functional and non-functional quality of service indicators concurrently, therefore easing decision-making. The main emphasis of the research is on the fundamental elements influencing the choice of cloud services in the present environment, the identification of extra characteristics of cloud services transcending SMI, and the identification of the most suitable approach for some services. By means of the measurement of customer enjoyment and experience, QoS traits provide some insight on the impact of trust mechanisms on service acceptance. Comparisons of SMI and QoS measurements before and after trust mechanism deployment provide insightful analysis. Empirical research guides these comparisons. This study aims to clarify the interactions among QoS, trust mechanisms, and cloud service adoption as well as highlight the implications these elements have for customers and service providers. Furthermore, presented in this paper is an algorithm using a comprehensive method to trust estimation in order to ascertain the degree of confidence worthiness of certain people.

Downloads

Download data is not yet available.

Author Biographies

Pooja Goyal, Department of Computer Science and Application, MD University, Rohtak, Haryana, India

Pooja Goyal. She is received a BCA degree in Computer Science from Maharshi Dayanand University, Rohtak in 2009, an MCA degree in 2012 and M.Tech in Computer Science and Engineering from the Maharshi Dayanand University, Rohtak in 2017, UGC(Net) in Computer Science in 2017 and pursuing PhD from Maharshi Dayanand University under the guidance of Dr. Sukhvinder Singh Deora.

Sukhvinder Singh Deora, Department of Computer Science and Application, MD University, Rohtak, Haryana, India

Sukhvinder Singh Deora. He is currently working as an Assistant Professor in the Department of Computer Sciences, at Maharshi Dayanand University, Rohtak, India. He received the MSc (Mathematics) & M.C.A. from Kurukshetra University in 2000 and 2002 respectively. He did his M.Phil. in Computer Science and completed his Ph.D. in 2015. He is a Reviewer of many SCIS-listed prestigious International and Indian Journals. He is also a member of the Editorial Board of some Journals. To his credit are many prominent papers in the area of data security, big data analytics, and issues related to Cloud Computing, general privacy and Computer Science education. He has also been editor of a few Proceedings at the National Level Seminars/Conferences. With an exposure of 19 years in education and 1.5 years in IT industry, his thrust areas also include Testing, Java technologies, and Database design issues. His current contributions are in areas including Big Data Analytics, Network Security, Theoretical Computer Sciences, and applications of Fuzzy Logic. He is an active member of professional societies like ACM, the Computer Society of India (CSI), and the Indian Society of Information Theory and Applications (ISITA). Some short vitae can be included here.

References

S. Pearson, “Privacy, security and trust in cloud computing,” in Privacy and security for cloud computing, Springer, 2013, pp. 3–42.

M. Shameem, R. R. Kumar, C. Kumar, B. Chandra, and A. A. Khan, “Prioritizing challenges of agile process in distributed software development environment using analytic hierarchy process,” J. Softw. Evol. Process, vol. 30, no. 11, p. e1979, 2018.

M. Chiregi and N. J. Navimipour, “Cloud computing and trust evaluation: A systematic literature review of the state-of-the-art mechanisms,” J. Electr. Syst. Inf. Technol., vol. 5, no. 3, pp. 608–622, 2018.

H. Hassan, A. I. El-Desouky, A. Ibrahim, E.-S. M. El-Kenawy, and R. Arnous, “Enhanced QoS-based model for trust assessment in cloud computing environment,” IEEE Access, vol. 8, pp. 43752–43763, 2020.

S. Soltani, M. Asadi, D. Gas¡evic´, M. Hatala, and E. Bagheri, “Automated planning for feature model configu- ration based on functional and non-functional requirements,” in Proceedings of the 16th International Software Product Line Conference-Volume 1, 2012, pp. 56–65.

S. K. Garg, S. Versteeg, and R. Buyya, “Smicloud: A framework for comparing and ranking cloud services,” in 2011 Fourth IEEE International Conference on Utility and Cloud Computing, 2011, pp. 210–218.

Z. Raghebi and M. R. Hashemi, “A new trust evaluation method based on reliability of customer feedback for cloud computing,” in 2013 10th international ISC conference on information security and cryptology (ISCISC), 2013, pp. 1–6.

R. R. Kumar, S. Mishra, and C. Kumar, “A novel framework for cloud service evaluation and selection using hybrid MCDM methods,” Arab. J. Sci. Eng., vol. 43, no. 12, pp. 7015–7030, 2018.

A. Tripathi, I. Pathak, and D. P. Vidyarthi, “Integration of analytic network process with service measurement index framework for cloud service provider selection,” Concurr. Comput. Pract. Exp., vol. 29, no. 12, p. e4144, 2017.

S. K. Garg, S. Versteeg, and R. Buyya, “A framework for ranking of cloud computing services,” Futur. Gener. Comput. Syst., vol. 29, no. 4, pp. 1012–1023, 2013.

R. K. Tiwari and R. Kumar, “A robust and efficient MCDM-based framework for cloud service selection using modified TOPSIS,” Int. J. Cloud Appl. Comput., vol. 11, no. 1, pp. 21–51, 2021.

C. Qu and R. Buyya, “A cloud trust evaluation system using hierarchical fuzzy inference system for service se- lection,” in 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, 2014, pp. 850–857.

R. K. L. Ko et al., “TrustCloud: A framework for accountability and trust in cloud computing,” in 2011 IEEE World Congress on Services, 2011, pp. 584–588.

J. Huang and D. M. Nicol, “Trust mechanisms for cloud computing,” J. Cloud Comput. Adv. Syst. Appl., vol. 2, no. 1, pp. 1–14, 2013.

A. Sarwar and M. N. Khan, “A review of trust aspects in cloud computing security,” Int. J. Cloud Comput. Serv. Sci., vol. 2, no. 2, p. 116, 2013.

A. Ezenwoke, O. Daramola, and M. Adigun, “QoS-based ranking and selection of SaaS applications using heterogeneous similarity metrics,” J. Cloud Comput., vol. 7, no. 1, pp. 1–12, 2018.

M. Almorsy, J. Grundy, and I. Mu¨ller, “An analysis of the cloud computing security problem,” arXiv Prepr. arXiv1609.01107, 2016.

P. Srivastava and R. Khan, “A Review Paper on Cloud Computing,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 8, no. 6, p. 17, 2018, doi: 10.23956/ijarcsse.v8i6.711.

A. Tyagi, “A review paper on cloud computing,” Int. J. Eng. Res. & Technol. ISSN, pp. 181–2278, 2017.

A. Rashid and A. Chaturvedi, “Cloud computing characteristics and services: a brief review,” Int. J. Comput. Sci. Eng., vol. 7, no. 2, pp. 421–426, 2019.

T. H. Noor, Q. Z. Sheng, Z. Maamar, and S. Zeadally, “Managing trust in the cloud: State of the art and research challenges,” Computer (Long. Beach. Calif)., vol. 49, no. 2, pp. 34–45, 2016.

T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu, “Trust management of services in cloud environments: Obstacles and solutions,” ACM Comput. Surv., vol. 46, no. 1, pp. 1–30, 2013.

W. Kim, “Cloud computing: Today and tomorrow.,” J. Object Technol., vol. 8, no. 1, pp. 65–72, 2009.

I. M. Khalil, A. Khreishah, and M. Azeem, “Cloud computing security: A survey,” Computers, vol. 3, no. 1, pp. 1–35, 2014.

M. K. Muchahari and S. K. Sinha, “A new trust management architecture for cloud computing environment,” in 2012 International Symposium on Cloud and Services Computing, 2012, pp. 136–140.

H. P. Borges, J. N. de Souza, J. N. de Souza, B. Schulze, and A. R. Mury, “A process for clouds services procurement based on model and qos,” in 2012 IEEE Latin America Conference on Cloud Computing and Communications (LatinCloud), 2012, pp. 37–42.

X. Yang, S. Wang, B. Yang, C. Ma, and L. Kang, “A service satisfaction-based trust evaluation model for cloud manufacturing,” Int. J. Comput. Integr. Manuf., vol. 32, no. 6, pp. 533–545, 2019.

R. L. Winkler, J. L. Butler, K. J. Curtis, and D. Egan-Robertson, “Differential privacy and the accuracy of county-level net migration estimates,” Popul. Res. Policy Rev., vol. 41, no. 2, pp. 417–435, 2022.

E. Kristiani, C.-T. Yang, Y. T. Wang, and C.-Y. Huang, “Implementation of an edge computing architecture using openstack and kubernetes,” in International Conference on Information Science and Applications, 2018, pp. 675–685.

X. Wu, R. Zhang, B. Zeng, and S. Zhou, “A trust evaluation model for cloud computing,” Procedia Comput. Sci., vol. 17, pp. 1170–1177, 2013.

P. Varalakshmi, T. Judgi, and D. Balaji, “Trust management model based on malicious filtered feedback in cloud,” in International Conference on Data Science Analytics and Applications, 2017, pp. 178–187.

J. Capachin, “Change on the horizon: The impact of cloud computing on treasury and transaction banking,” J. Payments Strateg. & Syst., vol. 4, no. 4, pp. 334–344, 2010.

J. Sidhu and S. Singh, “A novel cloud auditor based trust management framework for cloud computing,” Int. J. Grid Util. Comput., vol. 7, no. 3, pp. 219–235, 2016.

M. Chiregi and N. J. Navimipour, “A comprehensive study of the trust evaluation mechanisms in the cloud computing,” J. Serv. Sci. Res., vol. 9, no. 1, pp. 1–30, 2017.

S. T. Alshammari, A. Albeshri, and K. Alsubhi, “Building a trust model system to avoid cloud services reputation attacks,” Egypt. Informatics J., vol. 22, no. 4, pp. 493–503, 2021.

P. Sun, “Security and privacy protection in cloud computing: Discussions and challenges,” J. Netw. Comput. Appl., vol. 160, p. 102642, 2020.

G. Aghaee Ghazvini, M. Mohsenzadeh, R. Nasiri, and A. M. Rahmani, “A new multi-level trust manage- ment framework (MLTM) for solving the invalidity and sparse problems of user feedback ratings in cloud environments,” J. Supercomput., vol. 77, no. 3, pp. 2326–2354, 2021.

E. Cayirci and A. S. De Oliveira, “Modelling trust and risk for cloud services,” J. Cloud Comput., vol. 7, no. 1, pp. 1–16, 2018.

V. R. Thakare, “Computational trust evaluation algorithm for cloud models using fuzzy logic approach,” Int. J. Ad Hoc Ubiquitous Comput., vol. 38, no. 1–3, pp. 127–140, 2021.

S. M. Habib, S. Hauke, S. Ries, and M. Mu¨hlha¨user, “Trust as a facilitator in cloud computing: a survey,” J. Cloud Comput. Adv. Syst. Appl., vol. 1, no. 1, pp. 1–18, 2012.

S. S. Deora and others, “A Review: Trust Management Techniques Used for Cloud Computing,” Proc. Data Anal. Manag., pp. 117–132, 2022.

A. K. Jaithunbi, S. Sabena, and L. SaiRamesh, “Trust evaluation of public cloud service providers using genetic algorithm with intelligent rules,” Wirel. Pers. Commun., vol. 121, no. 4, pp. 3281–3295, 2021.

P. Goyal and S. S. Deora, “Reliability of Trust Management Systems in Cloud Computing”.

M. Alazab, G. Manogaran, and C. E. Montenegro-Marin, “Trust management for internet of things using cloud computing and security in smart cities,” Cluster Comput., vol. 25, no. 3, pp. 1765–1777, 2022.

S.-K. Chong, J. Abawajy, M. Ahmad, and I. R. A. Hamid, “Enhancing trust management in cloud environment,” Procedia-Social Behav. Sci., vol. 129, pp. 314–321, 2014.

D. H. McKnight and N. L. Chervany, “The meanings of trust,” 1996.

D. Catteddu, “Cloud Computing: benefits, risks and recommendations for information security,” in Iberic Web Application Security Conference, 2009, p. 17.

M. Armbrust et al., “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, pp. 50–58, 2010.

K. Hwang, S. Kulkareni, and Y. Hu, “Cloud security with virtualized defense and reputation-based trust mange- ment,” in 2009 Eighth IEEE international conference on dependable, autonomic and secure computing, 2009, pp. 717–722.

G. Garrison, S. Kim, and R. L. Wakefield, “Success factors for deploying cloud computing,” Commun. ACM, vol. 55, no. 9, pp. 62–68, 2012.

K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Comput., vol. 14, no. 5, pp. 14–22, 2010.

M. Soleymani, N. Abapour, E. Taghizadeh, S. Siadat, and R. Karkehabadi, “Fuzzy Rule-Based Trust Management Model for the Security of Cloud Computing,” Math. Probl. Eng., vol. 2021, 2021.

M. Nikravan and M. H. Kashani, “A review on trust management in fog/edge computing: Techniques, trends, and challenges,” J. Netw. Comput. Appl., p. 103402, 2022.

N. El Ioini, H. R. Barzegar, C. Pahl, and others, “Trust management for service migration in multi-access edge computing environments,” Comput. Commun., 2022.

D. Gambetta and others, “Can we trust trust,” Trust Mak. Break. Coop. relations, vol. 13, no. 1, pp. 213–237, 2000.

S. Ries, “Extending bayesian trust models regarding context-dependence and user friendly representation,” in Proceedings of the 2009 ACM symposium on Applied Computing, 2009, pp. 1294–1301.

S. M. Habib, S. Ries, and M. Muhlhauser, “Cloud computing landscape and research challenges regarding trust and reputation,” in 2010 7th International conference on ubiquitous intelligence & computing and 7th international conference on autonomic & trusted computing, 2010, pp. 410–415.

H. Kurdi et al., “A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments,” J. Supercomput., vol. 75, no. 7, pp. 3534–3554, 2019.

Liu, Yijia, et al. ”A survey on blockchain-based trust management for Internet of Things.” IEEE internet of Things Journal 10.7 2023, pp. 5898–5922.

Huber, Brennan, and Farah Kandah. ”DECAY: Dynamic Evaluation and Component Analysis for Enhancing Trust Management.” In 2024 IEEE International Conference on Consumer Electronics (ICCE), pp. 1-6. IEEE, 2024.

Fotia, Lidia, Fla´via Delicato, and Giancarlo Fortino. ”Trust in edge-based internet of things architectures: state of the art and research challenges.” ACM Computing Surveys 55.9 (2023), pp. 1–34.

Zeng, H., Dhiman, G., Sharma, A., Sharma, A. Tselykh, A. (2023). An IoT and Blockchain-based approach for the smart water management system in agriculture. Expert Systems, 40(4), e12892.

Shirvani, Mirsaeid Hosseini, and Mohammad Masdari. ”A survey study on trust-based security in Internet of Things: Challenges and issues.” Internet of Things 21 (2023): 100640.

Joshua, Salaki Reynaldo, et al. ”Trust components: An analysis in the development of type 2 diabetic mellitus mobile application.” Applied Sciences 13.3 (2023), pp. 1251.

M. Hosseinnezhad, M. A. Azgomi, and M. R. E. Dishabi, “A Probabilistic Trust Model for Cloud Services Using Bayesian Networks,” 2021.

A. S. Ali and O. F. Rana, “A belief-based trust model for dynamic service selection,” in Economic models and algorithms for distributed systems, Springer, 2009, pp. 9–23.

S. Pal, A. Hill, T. Rabehaja, and M. Hitchens, “A blockchain-based trust management framework with verifiable interactions,” Comput. Networks, vol. 200, p. 108506, 2021.

R. Nagarajan, S. Selvamuthukumaran, and R. Thirunavukarasu, “A fuzzy logic based trust evaluation model for the selection of cloud services,” in 2017 International Conference on Computer Communication and Informatics (ICCCI), 2017, pp. 1–5.

K. Chandran, V. Shanmugasudaram, and K. Subramani, “Designing a Fuzzy-Logic Based Trust and Reputation Model for Secure Resource Allocation in Cloud Computing.,” Int. Arab J. Inf. Technol., vol. 13, no. 1, 2016.

A. M. Mohammed, E. I. Morsy, and F. A. Omara, “Trust model for cloud service consumers,” in 2018 International Conference on Innovative Trends in Computer Engineering (ITCE), 2018, pp. 122–129.

N. Alhadad, Y. Busnel, P. Serrano-Alvarado, and P. Lamarre, “Graph-Based Trust Model for Evaluating Trust Using Subjective Logic,” 2013.

W. Jiang, G. Wang, M. Z. A. Bhuiyan, and J. Wu, “Understanding graph-based trust evaluation in online social networks: Methodologies and challenges,” Acm Comput. Surv., vol. 49, no. 1, pp. 1–35, 2016.

G. Obulaporam, N. Somu, G. R. ManiIyer Ramani, A. K. Boopathy, and S. S. Vathula Sankaran, “GCRIT- ICPA: A CRITIC and grey relational analysis based service ranking approach for cloud service selection,” in International Conference on Intelligent Information Technologies, 2018, pp. 3–16.

Y. Kuo, T. Yang, and G.-W. Huang, “The use of a grey-based Taguchi method for optimizing multi-response simulation problems,” Eng. Optim., vol. 40, no. 6, pp. 517–528, 2008.

I. Benjamin Franklin, M. Paul Arokiadass Jerald, and R. Bhuvaneswari, “Machine Learning-Based Trust Management in Cloud Using Blockchain Technology,” SN Comput. Sci., vol. 3, no. 6, pp. 1–11, 2022.

U. Jayasinghe, G. M. Lee, T.-W. Um, and Q. Shi, “Machine learning based trust computational model for IoT services,” IEEE Trans. Sustain. Comput., vol. 4, no. 1, pp. 39–52, 2018.

S. S. Sefati and S. Halunga, “A Hybrid Service Selection and Composition for Cloud Computing Using the Adaptive Penalty Function in Genetic and Artificial Bee Colony Algorithm,” Sensors, vol. 22, no. 13, p. 4873, 2022.

M. R. Thanka, P. Uma Maheswari, and E. B. Edwin, “An improved efficient: Artificial Bee Colony algorithm for security and QoS aware scheduling in cloud computing environment,” Cluster Comput., vol. 22, no. 5, pp. 10905–10913, 2019.

L. Huang, Z. Xiong, and G. Wang, “Evaluating Mechanism Trust Model Based on Behavior Result under Cloud Computing.,” Int. J. Simulation–Systems, Sci. & Technol., vol. 17, no. 30, 2016.

X. Li and J. Du, “Adaptive and attribute-based trust model for service-level agreement guarantee in cloud computing,” IET Inf. Secur., vol. 7, no. 1, pp. 39–50, 2013.

J. Araujo, P. Maciel, E. Andrade, G. Callou, V. Alves, and P. Cunha, “Decision making in cloud environments: an approach based on multiple-criteria decision analysis and stochastic models,” J. Cloud Comput., vol. 7, no. 1, pp. 1–19, 2018.

F. Nawaz, M. R. Asadabadi, N. K. Janjua, O. K. Hussain, E. Chang, and M. Saberi, “An MCDM method for cloud service selection using a Markov chain and the best-worst method,” Knowledge-Based Syst., vol. 159, pp. 120–131, 2018.

J. Sidhu and S. Singh, “Design and comparative analysis of MCDM-based multi-dimensional trust evaluation schemes for determining trustworthiness of cloud service providers,” J. Grid Comput., vol. 15, no. 2, pp. 197–218, 2017.

C.-W. Hang and M. P. Singh, “Trustworthy service selection and composition,” ACM Trans. Auton. Adapt. Syst., vol. 6, no. 1, pp. 1–17, 2011.

E. Zupancic and D. Trcek, “QADE: a novel trust and reputation model for handling false trust values in e-commerce environments with subjectivity consideration,” Technol. Econ. Dev. Econ., vol. 23, no. 1, pp. 81–110, 2017.

J. Luna Garcia, R. Langenberg, and N. Suri, “Benchmarking cloud security level agreements using quantitative policy trees,” in Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 2012, pp. 103–112.

M. Tavakolifard, S. J. Knapskog, and P. Herrmann, “Trust transferability among similar contexts,” in Pro- ceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks, 2008, pp. 91–97.

A. W. Coviello, H. D. Elias, P. Gelsinger, and R. McAniff, “Proof, not promises: creating the trusted cloud,” in ISSE 2011 Securing Electronic Business Processes, Springer, 2012, pp. 9–20.

S. N. V Schweizerische, “Information technology-Security techniques-Information security management systems-Requirements,” ISO/IEC Int. Stand. Organ., 2013.

M. Afzali, H. Pourmohammadi, and A. Mohammad Vali Samani, “An efficient framework for trust evaluation of secure service selection in fog computing based on QoS, reputation, and social criteria,” Computing, pp. 1–33, 2022.

Y. Wang and J. Vassileva, “A review on trust and reputation for web service selection,” in 27th international Conference on distributed computing systems workshops (ICDCSW’07), 2007, p. 25.

L. Ertaul, S. Singhal, and G. Saldamli, “Security Challenges in Cloud Computing.,” in Security and Management, 2010, pp. 36–42.

M. D. H. Parekh and R. Sridaran, “An analysis of security challenges in cloud computing,” Int. J. Adv. Comput. Sci. Appl., vol. 4, no. 1, 2013.

A. Behl, “Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation,” in 2011 World Congress on Information and Communication Technologies, 2011, pp. 217–222.

X. Deng, J. Liu, L. Wang, and Z. Zhao, “A trust evaluation system based on reputation data in mobile edge computing network,” Peer-to-Peer Netw. Appl., vol. 13, no. 5, pp. 1744–1755, 2020.

N. Subramanian and A. Jeyaraj, “Recent security challenges in cloud computing,” Comput. & Electr. Eng., vol. 71, pp. 28–42, 2018.

S. Pourmohseni, M. Ashtiani, and A. A. Azirani, “A Computational Trust Model for Social IoT based on Interval Neutrosophic Numbers,” Inf. Sci. (Ny)., 2022.

M. B. Monir, M. H. AbdelAziz, A. A. AbdelHamid, and E.-S. M. EI-Horbaty, “Trust management in cloud com- puting: a survey,” in 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS), 2015, pp. 231–242.

M. Alhanahnah, P. Bertok, and Z. Tari, “Trusting cloud service providers: trust phases and a taxonomy of trust factors,” IEEE cloud Comput., vol. 4, no. 1, pp. 44–54, 2017.

R. Kumar and R. Goyal, “Performance based Risk driven Trust (PRTrust): On modeling of secured service sharing in peer-to-peer federated cloud,” Comput. Commun., vol. 183, pp. 136–160, 2022.

A. Mousa, J. Bentahar, and O. Alam, “Multi-dimensional trust for context-aware services computing,” Expert Syst. Appl., vol. 172, p. 114592, 2021.

B. K. Ray, A. Saha, S. Khatua, and S. Roy, “Quality and profit assured trusted cloud federation formation: Game theory based approach,” IEEE Trans. Serv. Comput., vol. 14, no. 3, pp. 805–819, 2018.

O. K. Hussain, F. K. Hussain, and others, “Parallel cloud service selection and ranking based on QoS history,” Int. J. Parallel Program., vol. 42, no. 5, pp. 820–852, 2014.

S. Lee and K.-K. Seo, “A hybrid multi-criteria decision-making model for a cloud service selection problem using BSC, fuzzy Delphi method and fuzzy AHP,” Wirel. Pers. Commun., vol. 86, no. 1, pp. 57–75, 2016.

R. Srishylam and M. Umar, “Cloud Armor: A Trusty Supporting Reputation-based Management for Cloud Services,” CVR J. Sci. Technol., vol. 12, pp. 104–107, 2017.

S. N. Manoharan and others, “Euclidean Distance Based Similarity Measurement and Ensuing Ranking Scheme for Document Search from Outsourced Cloud Data,” Turkish J. Comput. Math. Educ., vol. 12, no. 3, pp. 4386–4395, 2021.

C. Jatoth, G. R. Gangadharan, U. Fiore, and R. Buyya, “SELCLOUD: a hybrid multi-criteria decision-making model for selection of cloud services,” Soft Comput., vol. 23, no. 13, pp. 4701–4715, 2019.

B. K. Dewangan, A. Agarwal, M. Venkatadri, and A. Pasricha, “Sla-based autonomic cloud resource manage- ment framework by antlion optimization algorithm,” Int. J. Innov. Technol. Explor. Eng.(IJITEE), vol. 8, pp. 119–123, 2019.

A. Selvaraj and S. Sundararajan, “Evidence-based trust evaluation system for cloud services using fuzzy logic,” Int. J. Fuzzy Syst., vol. 19, no. 2, pp. 329–337, 2017.

Y. Lu, X. Zheng, L. Li, and L. D. Xu, “Pricing the cloud: a QoS-based auction approach,” Enterp. Inf. Syst., vol. 14, no. 3, pp. 334–351, 2020.

N. Yadav and M. S. Goraya, “Two-way ranking based service mapping in cloud environment,” Futur. Gener. Comput. Syst., vol. 81, pp. 53–66, 2018.

M. Saleem, M. R. Warsi, S. Islam, A. Anjum, and N. Siddiquii, “Trust Management in the World of Cloud Computing. Past Trends and Some New Directions,” Scalable Comput. Pract. Exp., vol. 22, no. 4, pp. 425–444, 2021.

F. Nadeem, “A Unified Framework for User-Preferred Multi-Level Ranking of Cloud Computing Services Based on Usability and Quality of Service Evaluation,” IEEE Access, vol. 8, pp. 180054–180066, 2020.

R. Chalse, A. Selokar, and A. Katara, “A new technique of data integrity for analysis of the cloud computing security,” in 2013 5th International Conference and Computational Intelligence and Communication Networks, 2013, pp. 469–473.

L. Sun, J. Ma, Y. Zhang, H. Dong, and F. K. Hussain, “Cloud-FuSeR: Fuzzy ontology and MCDM based cloud service selection,” Futur. Gener. Comput. Syst., vol. 57, pp. 42–55, 2016.

J. Sidhu and S. Singh, “Improved topsis method based trust evaluation framework for determining trustwor- thiness of cloud service providers,” J. Grid Comput., vol. 15, no. 1, pp. 81–105, 2017.

R. R. Kumar, M. Shameem, and C. Kumar, “A computational framework for ranking prediction of cloud services under fuzzy environment,” Enterp. Inf. Syst., vol. 16, no. 1, pp. 167–187, 2022.

R. R. Kumar and C. Kumar, “A multi criteria decision making method for cloud service selection and ranking,” Int. J. Ambient Comput. Intell., vol. 9, no. 3, pp. 1–14, 2018.

P. Sun, “Research on cloud computing service based on trust access control,” Int. J. Eng. Bus. Manag., vol. 12, p. 1847979019897444, 2020.

S. Machhi and G. B. Jethava, “Feedback based trust management for cloud environment,” in Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, 2016, pp. 1–5.

M. Chiregi and N. J. Navimipour, “A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders’ entities and removing the effect of troll entities,” Comput. Human Behav., vol. 60, pp. 280–292, 2016.

R. Nagarajan, R. Thirunavukarasu, and S. Shanmugam, “A fuzzy-based intelligent cloud broker with MapRe- duce framework to evaluate the trust level of cloud services using customer feedback,” Int. J. Fuzzy Syst., vol. 20, no. 1, pp. 339–347, 2018.

M. B. Smithamol and S. Rajeswari, “TMM: trust management middleware for cloud service selection by prioritization,” J. Netw. Syst. Manag., vol. 27, no. 1, pp. 66–92, 2019.

X. Li, C. Yin, and F. Liu, “A trust estimation method of machine tool resources in the cloud environment,” J. Stat. Comput. Simul., vol. 87, no. 13, pp. 2572–2580, 2017.

G. M. Kumar, S. Ramachandram, and J. Gyani, “Trust model for cloud and grid environment using fuzzy logic and artificial neural network”.

R. B. Uriarte, H. Zhou, K. Kritikos, Z. Shi, Z. Zhao, and R. De Nicola, “Distributed service-level agreement management with smart contracts and blockchain,” Concurr. Comput. Pract. Exp., vol. 33, no. 14, p. e5800, 2021.

H. Zhou, X. Ouyang, J. Su, C. de Laat, and Z. Zhao, “Enforcing trustworthy cloud sla with witnesses: A game theory–based model using smart contracts,” Concurr. Comput. Pract. Exp., vol. 33, no. 14, p. e5511, 2021.

W. Hussain and J. M. Merigo´, “Centralised quality of experience and service framework using PROMETHEE- II for cloud provider selection,” in Intelligent processing practices and tools for e-commerce data, information, and knowledge, Springer, 2022, pp. 79–94.

X. Liu, C. Xia, T. Wang, L. Zhong, and X. Li, “A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service,” Front. Comput. Sci., vol. 14, no. 6, pp. 1–17, 2020.

O. A. Wahab, G. Rjoub, J. Bentahar, and R. Cohen, “Federated against the cold: A trust-based federated learning approach to counter the cold start problem in recommendation systems,” Inf. Sci. (Ny)., vol. 601, pp. 189–206, 2022.

J. Herce-Zelaya, C. Porcel, J. Bernabe´-Moreno, A. Tejeda-Lorente, and E. Herrera-Viedma, “New technique to alleviate the cold start problem in recommender systems using information from social media and random decision forests,” Inf. Sci. (Ny)., vol. 536, pp. 156–170, 2020.

I. E. Albert, A. J. Deepa, and A. L. Fred, “Fidelity Homogenous Genesis Recommendation Model for User Trust with Item Ratings,” Comput. J., 2022.

Y. Himeur et al., “Blockchain-based recommender systems: Applications, challenges and future opportuni- ties,” Comput. Sci. Rev., vol. 43, p. 100439, 2022.

W. Fang, W. Zhang, L. Shan, X. Ji, and G. Jia, “DDTMS: Dirichlet-distribution-based trust management scheme in Internet of Things,” Electronics, vol. 8, no. 7, p. 744, 2019.

Y. Wang, J. Wen, X. Wang, B. Tao, and W. Zhou, “A cloud service trust evaluation model based on combining weights and gray correlation analysis,” Secur. Commun. Networks, vol. 2019, 2019.

E. Alemneh, S.-M. Senouci, P. Brunet, and T. Tegegne, “A two-way trust management system for fog computing,” Futur. Gener. Comput. Syst., vol. 106, pp. 206–220, 2020.

R. Yadav and G. Baranwal, “An Efficient Trust Management using Feedback Credibility Evaluation Method in Fog Computing,” Simul. Model. Pract. Theory, vol. 120, p. 102610, 2022.

H. Kurdi, B. Alshayban, L. Altoaimy, and S. Alsalamah, “TrustyFeer: A subjective logic trust model for smart city peer-to-peer federated clouds,” Wirel. Commun. Mob. Comput., vol. 2018, 2018.

D. K. Aarthy, M. Aarthi, K. A. Farhath, S. Lakshana, and V. Lavanya, “Reputation-based trust management in cloud using a trusted third party,” in 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM), 2017, pp. 220–225.

Y. Liu and B. Wang, “User Trust Inference in Online Social Networks: A Message Passing Perspective,” Appl. Sci., vol. 12, no. 10, p. 5186, 2022.

J. Wang, M. Wang, Z. Zhang, and H. Zhu, “Towards A Trust Evaluation Framework against Malicious Behaviors of Industrial IoT,” IEEE Internet Things J., 2022.

A. Qadir Md and V. Vijayakumar, “Combined preference ranking algorithm for comparing and initial ranking of cloud services,” Recent Adv. Electr. & Electron. Eng. (Formerly Recent Patents Electr. & Electron. Eng., vol. 13, no. 2, pp. 260–275, 2020.

Published

2024-12-19

How to Cite

Goyal, P. ., & Deora, S. S. . (2024). Examining the Empirical Relationship Between Quality of Service (QoS) and Trust Mechanisms of Cloud Services. Journal of Web Engineering, 23(07), 913–972. https://doi.org/10.13052/jwe1540-9589.2372

Issue

Section

Articles